Investigating Suitable Multiple Access Techniques for Harbor Wireless Communication Systems
The multiple access communications for harbor environment are suffering from both low quality transmission due many metallic obstacles and overloaded networks due to the huge number of users/devices of logistic monitoring. This paper proposes a coded random access (CRA) scheme with a degree distribution suitable for harbor environment to serve many devices and provide communications with high reliability. The degree distribution is optimized using extrinsic information transfer (EXIT) charts by keeping that two EXIT curves do not intersect at low mutual information points. Since we are working on the network level, of which the benefit of broadband communications is kept for the fairness with the narrowband transmission, we convert the gain of broadband transmissions into an equivalent gain to the narrowband transmissions based on the Shannon channel capacity and coding theory. We then compare CRA to carrier sense multiple access with collision avoidance (CSMA/CA), because CSMA/CA has better performance compared to other techniques, such as ALOHA and Slotted ALOHA. We evaluate the performance of the proposed CRA and CSMA/CA using a series of computer simulation in additive white Gaussian noise (AWGN) and multipath Rayleigh fading channels in terms of throughput and packet-loss rate (PLR). The results confirmed that CRA with the proposed degree distribution is more suitable than CSMA/CA as a multiple access technique for harbor wireless communications, indicated that the proposed CRA has higher throughput and lower PLR. The results of this study are expected to contribute to the development of future harbor communication systems.
D. Andreas, “Pemerintah luncurkan roadmap indus- tri 4.0,” April 2018. [Online]. Available: https://tirto.id/ pemerintah-luncurkan-roadmap-industri-40-cHb2
Statista, “Internet of Things (IoT) active connections worldwide 2015-2025,” March 2020. [Online]. Available: https://www.statista. com/statistics/1101442/iot-number-of-connected-devices-worldwide/
O. Shmuel, A. Cohen, and O. Gurewitz, “Performance analysis of opportunistic distributed scheduling in multi-user systems,” IEEE Transactions on Communications, vol. 66, no. 10, pp. 4637–4652, 2018.
E. Paolini, C. Stefanovic, G. Liva, and P. Popovski, “Coded random access: applying codes on graphs to design random access protocols,” IEEE Communications Magazine, vol. 53, no. 6, pp. 144–150, 2015.
E. Paolini, G. Liva, and M. Chiani, “Coded slotted aloha: A graph- based method for uncoordinated multiple access,” IEEE Transactions on Information Theory, vol. 61, pp. 6815–6832, 2015.
A. A. Purwita and K. Anwar, “Vehicular massive multiway relay net- works applying graph-based random access,” in 2015 IEEE Vehicular Networking Conference (VNC), 2015, pp. 227–234.
A. A. Purwita and K. Anwar, “Massive multiway relay networks applying coded random access,” IEEE Transactions on Communications, vol. 64, no. 10, pp. 4134–4146, 2016.
K. Anwar, Juansyah, B. Syihabuddin, and N. M. Adriansyah, “Coded random access with simple header detection for finite length wireless IoT networks,” in 2017 Eighth International Workshop on Signal Design and Its Applications in Communications (IWSDA), 2017, pp. 94–98.
A. Mazin, M. Elkourdi, and R. D. Gitlin, “Comparison of Slotted Aloha-NOMA and CSMA/CA for M2M communications in IoT networks,” in 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), 2018, pp. 1–5.
Xiaolong Li and Qing-An Zeng, “Capture effect in the IEEE 802.11 WLANs with rayleigh fading, shadowing, and path loss,” in 2006 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2006, pp. 110–115.
Yunli Chen, Qing-An Zeng, and D. P. Agrawal, “Performance analysis and enhancement for IEEE 802.11 MAC protocol,” in 10th Interna- tional Conference on Telecommunications, 2003. ICT 2003., vol. 1, 2003, pp. 860–867 vol.1.
H.Harada and R.Prasad, Sea Transportation Statistics 2018. Artech House, 2002.
Yunli Chen, Qing-An Zeng, and D. P. Agrawal, “Analytical modeling of MAC protocol in ad hoc networks,” in WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, 2006., 2006, p. 8:45–59.
D. R. Baaqii, Y. Rahayu, and K. Anwar, “Menentukan degree distri- bution optimal pada coded random access (CRA) dengan multi user detection (MUD) k=3 menggunakan extrinsic information transfer (EXIT) chart,” in Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains, vol. 6, 2019.
F. M. Pasalbessy and K. Anwar, “Analysis of internet of things (IoT) networks using extrinsic information transfer (EXIT) chart,” in 2018 International Seminar on Intelligent Technology and Its Applications (ISITIA), 2018, pp. 281–285.
K. Anwar, “High-dense multiway relay networks exploiting direct links as side information,” in 2016 IEEE International Conference on Communications (ICC), 2016, pp. 1–6.
S. Larasati, I. N. A. Ramatryana, and K. Anwar, “High-rate coded random access for non-orthogonal multiple access with human prior- ity,” in 2018 2nd International Conference on Telematics and Future Generation Networks (TAFGEN), 2018, pp. 25–30.
A. Ashikhmin, G. Kramer, and S. ten Brink, “Extrinsic information transfer functions: model and erasure channel properties,” IEEE Transactions on Information Theory, vol. 50, no. 11, pp. 2657–2673, October 2004.
K. Anwar and R. P. Astuti, “Finite-length analysis for wireless super- dense networks exploiting coded random access over rayleigh fading channels,” in 2016 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob), 2016, pp. 7–13.
K. Anwar, “Decoding for wireless super-dense networks and its finite-length analysis for practical applications,” in 2016 International Symposium on Electronics and Smart Devices (ISESD), 2016, pp. 347–354.
M. Ivanov, F. Brannstrom, A. G. I. Amat, and P. Popovski, “Error floor analysis of coded slotted aloha over packet erasure channels,” IEEE Communications Letters, vol. 19, pp. 419–422, 2015.
- There are currently no refbacks.
Published by INSIGHT - Indonesian Society for Knowledge and Human Development